2020
DOI: 10.30534/ijeter/2020/538102020
|View full text |Cite
|
Sign up to set email alerts
|

The Effect of Bad Password Habits on Personal Data Breach

Abstract: Users tend to utilize bad or weak passwords with memorable characteristics such as simple words from the dictionary and easy to remember sequence of numbers from birthdays. Poor or bad password habits lead to compromise of personal data privacy and allow hackers to gain unauthorised access to these passwords and use them for criminal and fraudulent cyber activities. The purpose of this research is to examine the impact of password habits among Malaysians on their personal data breaches. This study provides ins… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 21 publications
(27 reference statements)
0
1
0
Order By: Relevance
“…In this rapidly evolving, privacy concerns and advertising intrusiveness are becoming primary concerns for marketers to address. Consumers’ privacy concerns can be reasoned with digital scandals and significant data breaches from major giants like Facebook, LinkedIn, and yahoo in the recent time period ( Dastane, 2020 ). Moreover, since mobile phone usage is highly personal and more interactive, high privacy concerns should be expected.…”
Section: Discussionmentioning
confidence: 99%
“…In this rapidly evolving, privacy concerns and advertising intrusiveness are becoming primary concerns for marketers to address. Consumers’ privacy concerns can be reasoned with digital scandals and significant data breaches from major giants like Facebook, LinkedIn, and yahoo in the recent time period ( Dastane, 2020 ). Moreover, since mobile phone usage is highly personal and more interactive, high privacy concerns should be expected.…”
Section: Discussionmentioning
confidence: 99%
“…Upon proper input, the security key fob will exhibit a numerical value. The second component is a need for the user to input to gain access to the device or network [27]. Table (1) explains the differences between the previous authentication factors.…”
Section: Wwwminarjournalcommentioning
confidence: 99%